Sign In with your
Trend Micro Account
Need Help?
Need More Help?

Create a technical support case if you need further support.

Digital Vaccine #9599

    • Updated:
    • 20 Oct 2021
    • Product/Version:
    • TippingPoint Digital Vaccine
    • Platform:
Summary
Digital Vaccine #9599      October 19, 2021
Details
Public
Thank you for subscribing to Digital Vaccine updates brought to you by Trend Micro™ TippingPoint DVLabs.

New content is now available at the Threat Management Center (TMC): https://tmc.tippingpoint.com.
 
System Requirements
The 3.2.0 DV will run on IPS devices with TOS v3.2.0 and above,  and all TPS systems. The 4.0.0 DV will only run on the Virtual Threat Protection System (vTPS) appliance. Please note that vTPS does not currently support pre-disclosed ZDI filters.
 
Adobe Security Bulletins
This DV includes coverage for the Adobe vulnerabilities released on or before October 12, 2021. The following table maps TippingPoint filters to the Adobe CVEs.
BulletinCVEFilter
APSB21-104CVE-2021-4072940414
APSB21-104CVE-2021-4073040409
APSB21-104CVE-2021-4073140410
Filters marked with * shipped prior to this DV, providing zero-day protection.
 
The Digital Vaccine can be manually downloaded from the following URLs:
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=digital_vaccines&contentId=SIG_3.2.0_9599.pkg
https://tmc.tippingpoint.com/TMC/ViewPackage?parentFolderId=vsa_dv&contentId=SIG_VTPS_4.0.0_9599.pkg

Update Details

Table of Contents
--------------------------

Filters
 New Filters - 12
 Modified Filters (logic changes) - 18
 Modified Filters (metadata changes only) - 12
 Removed Filters - 32

Filters
----------------
  New Filters: 

    40314: Microsoft Visual Studio Code Maven For Java Extension Command Injection
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a command injection vulnerability in the Maven for Java Extension for Microsoft Visual Studio.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-28472 CVSS 7.8
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: October 19, 2021

    40381: HTTP: Citrix ShareFile Storage Zones Controller NeatUpload Directory Traversal Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Citrix ShareFile Storage Zones Controller.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-22941 CVSS 10.0
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 19, 2021

    40393: HTTP: Delta Industrial Automation DIAEnergie HandlerEnergyType.aspx SQL Injection Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a SQL Injection vulnerability in Delta Industrial Automation.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-38390
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Other Server Application or Service
      - Release Date: October 19, 2021

    40394: HTTP: Schneider Electric C-Bus Toolkit Directory Traversal Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: High
      - Description: This filter detects an attempt to exploit a directory traversal vulnerability in Schneider Electric C-Bus Toolkit.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-22720 CVSS 8.8
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 19, 2021

    40395: HTTP: Zoho ManageEngine OpManager getReportData SQL Injection Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a SQL injection vulnerability in Zoho ManageEngine OpManager.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-41288
      - Classification: Vulnerability - Input Validation (Command injection, XSS, SQL injection, etc)
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 19, 2021

    40408: ZDI-CAN-14424: Zero Day Initiative Vulnerability (WECON PLC Editor)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: N/NX-Platform or TPS devices
      - Category: Exploits
      - Severity: Critical
      - Description: This filter protects against exploitation of a zero-day vulnerability affecting WECON PLC Editor.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 19, 2021

    40409: HTTP: Adobe Acrobat Reader DC JPG2000 Use-After-Free Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit a use-after-free vulnerability in Adobe Acrobat Reader DC.
      - Deployments:
        - Deployment: Default (Block / Notify)
        - Deployment: Performance-Optimized (Disabled)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-40730
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: October 19, 2021

    40410: HTTP: Adobe Acrobat Reader DC JPG2000 Out-of-Bounds Write Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: Critical
      - Description: This filter detects an attempt to exploit an out-of-bounds write vulnerability in Adobe Acrobat DC.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-40731
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: October 19, 2021

    40411: ZDI-CAN-15317: Zero Day Initiative Vulnerability (SolarWinds Network Performance Monitor)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Category: Vulnerabilities
      - Severity: Critical
      - Description: This filter provides protection against exploitation of a zero-day vulnerability affecting SolarWinds Network Performance Monitor.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify / Trace)
      - Classification: Vulnerability - Other
      - Protocol: Other Protocol
      - Platform: Other Server Application or Service
      - Release Date: October 19, 2021

    40412: HTTP: Wordpress BulletProof Security Plugin db_backup_log.txt Usage
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects the usage of requests to db_backup_log.txt for Wordpress BulletProof Security plugin.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-39327 CVSS 5.3
      - Classification: Security Policy - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: October 19, 2021

    40414: HTTP: Adobe Acrobat Reader DC Out-of-Bounds Read Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Exploits
      - Severity: High
      - Description: This filter detects an attempt to exploit an out-of-bounds read vulnerability in Adobe Acrobat Reader DC.
      - Deployments:
        - Deployment: Security-Optimized (Block / Notify)
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-40729
      - Classification: Vulnerability - Other
      - Protocol: HTTP
      - Platform: Multi-Platform Client Application
      - Release Date: October 19, 2021

    40421: HTTP: Apache HTTP Server Long UDS Path Name Proxy Request
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Category: Security Policy
      - Severity: Moderate
      - Description: This filter detects proxy requests with long UDS path name to Apache HTTP Server.
      - Deployment: Not enabled by default in any deployment.
      - References:
        - Common Vulnerabilities and Exposures: CVE-2021-40438
      - Classification: Security Policy - Forbidden Application Access or Service Request
      - Protocol: HTTP
      - Platform: Multi-Platform Server Application or Service
      - Release Date: October 19, 2021

  Modified Filters (logic changes):
    * = Enabled in Default deployments

    * 1576: Backdoor: Back Orifice Communications
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: December 31, 2005
      - Last Modified Date: October 19, 2021

    * 3014: MS-RPC: Fragmented RPC Request
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: December 31, 2005
      - Last Modified Date: October 19, 2021

    * 8096: HTTP: Malicious Microsoft PowerPoint Document
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: May 12, 2009
      - Last Modified Date: October 19, 2021

    * 8630: HTTP: RealPlayer ActiveX Buffer Overflow (ZDI-08-046)
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: October 08, 2009
      - Last Modified Date: October 19, 2021

    * 9161: TCP: Oracle Database SQL Compiler Access Control Security Bypass Vulnerability
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: May 06, 2014
      - Last Modified Date: October 19, 2021

    35529: HTTP: Delta Industrial Automation TPEditor File Parsing Buffer Overflow Vulnerability (ZDI-19-828)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "35529: ZDI-CAN-8563: Zero Day Initiative Vulnerability (Delta Industrial Automation TPEditor)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: June 18, 2019
      - Last Modified Date: October 19, 2021

    37010: HTTP: Adobe Bridge EPS BoundingBox Element Stack-based Buffer Overflow Vulnerability (ZDI-20-565)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "37010: ZDI-CAN-10052,10053: Zero Day Initiative Vulnerability (Multiple Adobe Products)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: February 04, 2020
      - Last Modified Date: October 19, 2021

    38584: HTTP: Advantech WebAccess HMI Designer PM3 Buffer Overflow Vulnerability (ZDI-21-490)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "38584: ZDI-CAN-12276: Zero Day Initiative Vulnerability (Advantech WebAccess/HMI Designer)".
      - Category changed from "Exploits" to "Vulnerabilities".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: December 15, 2020
      - Last Modified Date: October 19, 2021

    39584: HTTP: Autodesk Design Review TGA Out-Of-Bounds Read Vulnerability (ZDI-21-753,1135)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39584: ZDI-CAN-13382: Zero Day Initiative Vulnerability (AutoDesk Design Review)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 27, 2021
      - Last Modified Date: October 19, 2021

    39586: HTTP: Autodesk Design Review TGA Out-Of-Bounds Read Vulnerability (ZDI-21-752,1134)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39586: ZDI-CAN-13376: Zero Day Initiative Vulnerability (AutoDesk Design Review)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 27, 2021
      - Last Modified Date: October 19, 2021

    39601: HTTP: Autodesk Design Review TGA File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-751,1132)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39601: ZDI-CAN-13373: Zero Day Initiative Vulnerability (AutoDesk Design Review)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 27, 2021
      - Last Modified Date: October 19, 2021

    39613: HTTP: Trend Micro ServerProtect Authentication Bypass Vulnerability (ZDI-21-1115)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39613: ZDI-CAN-12771: Zero Day Initiative Vulnerability (Trend Micro ServerProtect)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: April 27, 2021
      - Last Modified Date: October 19, 2021

    * 40025: HTTP: Microsoft Office Word Converter Use-After-Free Vulnerability (ZDI-21-1158)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40025: ZDI-CAN-14203: Zero Day Initiative Vulnerability (Microsoft Word)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: July 27, 2021
      - Last Modified Date: October 19, 2021

    * 40072: HTTP: Microsoft Office Visio EMF Improper Validation of Array Index Vulnerability (ZDI-21-1159)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40072: ZDI-CAN-14216: Zero Day Initiative Vulnerability (Microsoft Office Visio)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 17, 2021
      - Last Modified Date: October 19, 2021

    * 40073: HTTP: Microsoft Office Visio WMF File Parsing Use-After-Free Vulnerability (ZDI-21-1160)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40073: ZDI-CAN-14224: Zero Day Initiative Vulnerability (Microsoft Office Visio)".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 17, 2021
      - Last Modified Date: October 19, 2021

    * 40076: HTTP: Microsoft Project MPT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-1144)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "40076: ZDI-CAN-14518: Zero Day Initiative Vulnerability (Microsoft Project)".
      - Severity changed from "Critical" to "High".
      - Description updated.
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: August 17, 2021
      - Last Modified Date: October 19, 2021

    40132: TCP: PEAR Archive Tar Symbolic Link Handling Arbitrary File Write Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Detection logic updated.
      - Release Date: August 24, 2021
      - Last Modified Date: October 19, 2021

    40392: ZDI-CAN-15314-15316,15318: Zero Day Initiative Vulnerability(SolarWinds Network Performance Monitor)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Requires: IPS N-Platform, NX-Platform, or TPS models.
      - Name changed from "40392: ZDI-CAN-15314: Zero Day Initiative Vulnerability (SolarWinds Network Performance Monitor)".
      - Detection logic updated.
      - Vulnerability references updated.
      - Release Date: October 12, 2021
      - Last Modified Date: October 19, 2021

  Modified Filters (metadata changes only):
    * = Enabled in Default deployments

    1125: HTTP: ../.. Directory Traversal
      - IPS Version: 1.0.0 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Release Date: December 31, 2005
      - Last Modified Date: October 19, 2021

    39253: HTTP: Autodesk Design Review PICT File Parsing Buffer Overflow Vulnerability (ZDI-21-720,1136)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39253: HTTP: Autodesk Design Review PICT File Parsing Heap-based Buffer Overflow Vulnerability (ZDI-21-720)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 16, 2021
      - Last Modified Date: October 19, 2021

    39254: HTTP: Autodesk Design Review PICT File Parsing Buffer Overflow Vulnerability (ZDI-21-721,1137)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39254: HTTP: Autodesk Design Review PICT File Parsing Heap-based Buffer Overflow Vulnerability (ZDI-21-721)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 16, 2021
      - Last Modified Date: October 19, 2021

    39257: HTTP: Autodesk Design Review PICT File Parsing Buffer Overflow Vulnerability (ZDI-21-722,1130)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39257: HTTP: Autodesk Design Review PICT File Parsing Heap-based Buffer Overflow Vulnerability (ZDI-21-722)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 16, 2021
      - Last Modified Date: October 19, 2021

    39258: HTTP: Autodesk Design Review PICT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-723)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 16, 2021
      - Last Modified Date: October 19, 2021

    39261: HTTP: Autodesk Design Review PICT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-726,1133)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39261: HTTP: Autodesk Design Review PICT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-726)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 16, 2021
      - Last Modified Date: October 19, 2021

    39262: HTTP: Autodesk Design Review PICT Out-Of-Bounds Read Vulnerability (ZDI-21-727,1140)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39262: HTTP: Autodesk Design Review PICT File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-727)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 16, 2021
      - Last Modified Date: October 19, 2021

    39267: HTTP: Autodesk Design Review PICT File Parsing Buffer Overflow Vulnerability (ZDI-21-732,1131)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39267: HTTP: Autodesk Design Review PICT File Parsing Heap-based Buffer Overflow Vulnerability (ZDI-21-732)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 16, 2021
      - Last Modified Date: October 19, 2021

    39367: HTTP: Autodesk Design Review PICT File Parsing Buffer Overflow Vulnerability (ZDI-21-734,1128)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39367: HTTP: Autodesk Design Review PICT File Parsing Heap-based Buffer Overflow Vulnerability (ZDI-21-734)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 30, 2021
      - Last Modified Date: October 19, 2021

    39371: HTTP: Autodesk Design Review TIF Out-Of-Bounds Read Vulnerability (ZDI-21-738,1129)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Name changed from "39371: HTTP: Autodesk Design Review TIF File Parsing Out-Of-Bounds Read Vulnerability (ZDI-21-738)".
      - Description updated.
      - Vulnerability references updated.
      - Release Date: March 30, 2021
      - Last Modified Date: October 19, 2021

    39678: HTTP: Schneider Electric Struxureware Data Center Command Injection Vulnerability (ZDI-21-1072)
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Vulnerability references updated.
      - Release Date: May 11, 2021
      - Last Modified Date: October 19, 2021

    40242: HTTP: WordPress Plugin ProfilePress Privilege Escalation Vulnerability
      - IPS Version: 3.6.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Miscellaneous modification.
      - Release Date: October 12, 2021
      - Last Modified Date: October 19, 2021

  Removed Filters:

    20298: ZDI-CAN-3043: Zero Day Initiative Vulnerability (Adobe Reader DC)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: August 11, 2015
      - Last Modified Date: October 23, 2018

    21935: ZDI-CAN-3360: Zero Day Initiative Vulnerability (Oracle Demantra)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: 4.0.1 and after.
      - Release Date: December 01, 2015
      - Last Modified Date: March 14, 2017

    22733: ZDI-CAN-3468: Zero Day Initiative Vulnerability (Google Chrome)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: February 02, 2016
      - Last Modified Date: October 23, 2018

    24491: ZDI-CAN-3682: Zero Day Initiative Vulnerability (Microsoft 3D Builder)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: May 03, 2016
      - Last Modified Date: October 23, 2018

    24749: ZDI-CAN-3490: Zero Day Initiative Vulnerability (Foxit Reader)
      - IPS Version: 3.2.2 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: June 07, 2016
      - Last Modified Date: October 23, 2018

    26483: ZDI-CAN-4130: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 10, 2017
      - Last Modified Date: October 23, 2018

    26485: ZDI-CAN-4131: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 10, 2017
      - Last Modified Date: October 23, 2018

    26486: ZDI-CAN-4132: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 10, 2017
      - Last Modified Date: October 23, 2018

    26487: ZDI-CAN-4133: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 10, 2017
      - Last Modified Date: October 23, 2018

    26490: ZDI-CAN-4135: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 10, 2017
      - Last Modified Date: October 23, 2018

    26492: ZDI-CAN-4136: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 10, 2017
      - Last Modified Date: October 23, 2018

    26506: ZDI-CAN-4137: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26507: ZDI-CAN-4138: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26508: ZDI-CAN-4320: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 24, 2017
      - Last Modified Date: October 23, 2018

    26509: ZDI-CAN-4141: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26511: ZDI-CAN-4142: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26513: ZDI-CAN-4143: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26514: ZDI-CAN-4144: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26515: ZDI-CAN-4145: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26516: ZDI-CAN-4146: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26519: ZDI-CAN-4210: Zero Day Initiative Vulnerability (Adobe Flash)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 17, 2017
      - Last Modified Date: October 23, 2018

    26637: ZDI-CAN-4321: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 24, 2017
      - Last Modified Date: October 23, 2018

    26769: ZDI-CAN-4220: Zero Day Initiative Vulnerability (Cisco WAAS Mobile Server)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: January 31, 2017
      - Last Modified Date: October 23, 2018

    26803: ZDI-CAN-4281: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: February 07, 2017
      - Last Modified Date: October 23, 2018

    26814: ZDI-CAN-4282: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: February 07, 2017
      - Last Modified Date: October 23, 2018

    26819: ZDI-CAN-4328: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: February 07, 2017
      - Last Modified Date: October 23, 2018

    26831: ZDI-CAN-4274: Zero Day Initiative Vulnerability (Trend Micro Data Loss Prevention Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: February 07, 2017
      - Last Modified Date: October 23, 2018

    27310: ZDI-CAN-4474: Zero Day Initiative Vulnerability (Trend Micro Control Manager)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: March 07, 2017
      - Last Modified Date: October 23, 2018

    27809: ZDI-CAN-4492: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: April 11, 2017
      - Last Modified Date: October 23, 2018

    29145: ZDI-CAN-4915: Zero Day Initiative Vulnerability (Cisco Prime Network Analysis Module)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: July 25, 2017
      - Last Modified Date: October 23, 2018

    29146: ZDI-CAN-4916: Zero Day Initiative Vulnerability (Cisco Prime Network Analysis Module)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: July 25, 2017
      - Last Modified Date: October 23, 2018

    29634: ZDI-CAN-5035: Zero Day Initiative Vulnerability (Adobe Acrobat Pro DC)
      - IPS Version: 3.1.3 and after.
      - TPS Version: 4.0.0 and after.
      - vTPS Version: Not available.
      - Release Date: September 26, 2017
      - Last Modified Date: October 23, 2018


Top of the Page
Premium
Internal
Partner
Rating:
Category:
Configure; Troubleshoot; Deploy
Solution Id:
TP000289482
Feedback
Did this article help you?

Thank you for your feedback!


*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.

If you need additional help, you may try to contact the support team. Contact Support

To help us improve the quality of this article, please leave your email here so we can clarify further your feedback, if neccessary:
We will not send you spam or share your email address.

*This form is automated system. General questions, technical, sales, and product-related issues submitted through this form will not be answered.